Bosch D7412GV2 Manual de usuario Pagina 2

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 6
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 1
2 | D7412GV2 Control Panel
14 custom authority levels control user’s authority to
change, add, delete passcodes, delete access control
tokens, delete cards, disarm, bypass points, and
initiate system tests
Note
Use at least one keypad in each system.
Area Configurations
Area programming offers a wide selection of different
system configurations. Each area is assigned an account
number to define annunciation, control, and reporting
functions. Multiple areas can be linked to a shared area
which is automatically controlled (hallway or lobby).
Area arming can be conditional on other areas (master
or associate).
Two Man Rule
Two Man Rule requires two unique passcodes on the
same keypad to disarm an area. Without the second
passcode, the system denies entry. Two Man Rule
requires the presence of two people at opening,
providing added security.
Early Ambush
Early Ambush requires two passcode entries on the
same keypad. Enter the same passcode twice or have
two unique passcodes, depending on the configuration.
The first entry disarms the area and the second entry
stops a timer programmed to send a duress event. If the
second entry does not occur within the programmed
time, the system generates a duress event. Early Ambush
allows users to inspect the premises and use the system
to confirm that the area is safe to enter, providing added
security.
Easy Exit Control
The D7412GV2 Control Panel changes from one armed
state to another armed state without disarming. For
example, if you change the state from Master Arm to
Perimeter Arm, the control panel complies and reports
the change. Easy Exit Control reduces the number of
keystrokes, simplifying system operation.
Programmable Passcode-controlled Menu List
The system prompts users to enter a passcode prior to
viewing the keypad menu. The keypad display shows the
user the menu options allowed according to the user’s
authority level. Passcode-controlled menus provide
users only with the options and information pertinent to
them, simplifying system operation.
Passcode Follows Scope
Use Passcode Follows Scope to restrict passcode
arming and disarming only to the keypad’s immediate
local area, even if the keypad can report events from
other areas. Passcode Follows Scope simplifies the
arming and disarming procedure without limiting any
other keypad capabilities.
Invisible Walk Test
A menu item allows the user to test invisible 24-hour
points within the scope of the keypad without sending
a report to the central station.
Door Activated Custom Function
A custom function activates when user credentials are
presented to a D9210B door controller's reader. The
custom function behaves as though the user performed
a function at the keypad associated with the door
controller.
Passcodes
User passcodes contain three to six digits. Assign each
user one of 14 customized authority levels in each area.
Restrict passcodes to operate only during certain times.
The Two Man Rule and Early Ambush options require
two passcodes, providing additional security in financial
establishments such as banks.
Communications
The D7412GV2 Control Panel prioritizes and sends
reports in BFSK or Modem IIIa
2
communications formats
to four route groups. Each group has a programmable
primary and backup destination.
The D7412G works with the D6600 NetCom
Communications System using a DX4020 Network
Interface Module. It has programmable anti-replay anti-
substitution features when using a DX4020.
The Modem IIIa
2
Communications Format, available with
Bosch receivers, adds reporting capabilities such as:
Individual point numbers and text
Opening or closing reports by area number
Remote programming attempts
Diagnostic reports
Sends user names to the central station
Security and Fire Detection
The D7412GV2 Control Panel provides eight on-board
points, and up to 67 additional off-board points
(depending on model and expansion interfaces). You
can program individual points to monitor all types of
burglar alarms, fire alarms, and supervision devices.
Event Log
The event log stores up to 1,000 local and transmitted
events. The event log includes time, date, event, area,
point, and user number. View the event log from select
Vista de pagina 1
1 2 3 4 5 6

Comentarios a estos manuales

Sin comentarios